How Data
Breaches Happen

And What to Do When They Happen to You

June 23, 2022
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST

A full-day virtual event on the vulnerabilities that lead to security incidents - and how to respond in the event of a data breach.

Every day, the headlines are filled with news of major enterprises being hacked or infected with ransomware. From supply chain attacks such as SolarWinds or Kaseya to critical infrastructure breaches such as Colonial Pipeline, it seems that no organization is safe from cyber breaches. Is your organization ready to respond when it happens to you?

On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.

If you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you.

Topics Include:
An in-depth look at how major data breaches occur, and what vulnerabilities they exploit
Tips and recommendations for finding and fixing security vulnerabilities in your own IT environment
Methods for detecting a new incursion, even when it is well hidden or obfuscated
Critical actions to take when you suspect your data has been compromised
And much more!
Agenda
Keynote
11:00 AM – 12:00 PM ET

Common Cybersecurity Missteps That Leave Your Enterprise Open to Attack

Sponsored by: Palo Alto Networks
Presented by: Matt Gorham, Senior Managing Director, PwC’s Cyber, Risk, and Regulation Practice
Moderated by: Kelly Jackson Higgins

Major data breaches happen, and often they are the result of an oversight or unknown vulnerability in an IT infrastructure that attackers spot and exploit first. In this keynote presentation, a top cybersecurity expert will shine light on some of the most common security mistakes that can lead to an attack and how to find and fix these weaknesses in your IT infrastructure.

Keynote
12:30 PM - 1:30 PM ET

Real-World Data Breaches: A Look at the Trends

Sponsored by: KnowBe4
Presented by: Alex Pinto, Principal Author of the Verizon Data Breach Investigations Report
Moderated by: Fahmida Y Rashid

In this keynote address, a top security researcher will detail and analyze the common findings and trends in real-world data breaches of the past year – including the most popular attack vectors, exploited vulnerabilities – and the best practices for thwarting these attacks in the future.

Panel
2:15 PM – 3:00 PM ET

How to Protect Your Endpoints From Getting Weaponized by Attackers

Sponsored by: CardinalOps, CyberArk

The endpoint is often the focus of the first stage in a cyberattack, as attackers attempt to gain a foothold in their targets, via phishing or other nefarious means. How can you assess and ensure your users’ devices are secured and the state of your risk posture to attacks? What can you do to understand and best decide how to best protect them from attackers looking for a foothold in your network? In this panel discussion, experts in endpoint security will provide insight into threats to the endpoint and how best to protect these devices – and your user accounts – from becoming pawns in a cyberattack.

Panel
3:15 PM – 4:00 PM ET

Finding and Fixing Security Vulnerabilities That Put Your Data in Danger

Sponsored by: Dashlane, Bishop Fox

Software vendors are constantly issuing patches and updates to their products. Not all vulnerabilities are critical, so how do you assess and prioritize your risk of an attacker exploiting them in your servers, endpoints, and network systems? In this panel discussion, experts will offer recommendations for pinpointing the security flaws that put your data at risk and provide insight on how to establish a sound patching policy that includes risk assessment and ensures solid security posture.

Panel
4:15 PM - 5:00 PM ET

What to Do in a Cyber Incident: A Guide to Incident Response

Sponsored by: CyCognito, Mandiant

No organization is immune to cyber threats and attack attempts, but there are some key steps, strategies, and technologies, to help ensure a security event doesn’t escalate, including proactive threat hunting, detection of even the most well-hidden threats, and mitigation methods. What actions should you take if you think your data has been compromised? In this panel discussion, experts in incident response will offer a look at how best to respond to a security incident, including a look at the role of new tools such as eXtendedDetection and Response (XDR) and state-of-the art IR practices.

How Data
Breaches Happen

June 23, 2022
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST
Speakers
Linnie Meehan
Threat Hunter, Deepwatch
Linnie Meehan serves as a Threat Hunter at Deepwatch. Her nearly decade-long time in Cybersecurity includes previous roles as a Cybersecurity Analyst and Threat Analyst from mid-size domestic companies to world-wide organizations. Linnie enjoys mentoring, attending cybersecurity conferences, working on projects with her nerd friends, and participat
Len Noe
Technical Evangelist and White Hat Hacker, CyberArk Software
Len Noe is a Technical Evangelist and White Hat Hacker CyberArk Software. Len is an international security speaker has presented in over 29 countries and at multiple major security conferences worldwide. Prior to 2001 Len was a Black/Grey Hat Hacker and learned most of his skills by practical application.
Phil Neray
Phil Neray
VP of Cyber Defense Strategy, CardinalOps
CardinalOps delivers AI-powered detection content and metrics to ensure your SOC is protected from the MITRE ATT&CK techniques most relevant to your organization's adversaries, infrastructure, and business priorities. With 20+ years of cybersecurity experience, Phil comes to CardinalOps from Microsoft Security, which he joined after the acquisition
Jeremy Koppen Headshot
Jeremy Koppen
Director of Consulting for the Americas, Mandiant
Jeremy Koppen is Director in Mandiant’s Alexandria, VA, office with over ten years of experience in programming, computer hardware, cybercrime investigations, computer forensics, and information security. Mr. Koppen’s primary responsibilities include leading and delivering incident response engagements as well as performing forensic analysis.
Fahmida Y Rashid headshot
Fahmida Y Rashid
Managing Editor, Dark Reading
Fahmida Y Rashid is Dark Reading’s features editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers. Prior to specializing in information security, Fahmida was wri
Kelly Jackson Higgins
Editor-in-Chief
Alex Pinto Headshot
Alex Pinto
Principal Author of the Verizon Data Breach Investigations Report
Alex Pinto is the senior manager of the Verizon DBIR team. His team is responsible not only for the Verizon Data Breach Investigations Report, but for security research and thought leadership for all the Verizon Business Security Products organization.
Matt Gorham, Senior Managing Director
Matt Gorham
Senior Managing Director, PwC’s Cyber, Risk, and Regulation Practice
Matt Gorham currently serves as a Senior Managing Director with PwC’s Cyber, Risk, and Regulation Practice. Prior to his current role, he had a twenty-five year career with the Federal Bureau of Investigation.
Sponsors
Keynote
Premier
© 2022 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service

How Data Breaches Happen